This post reviews several widely used frameworks and models, organized into four categories: Attack and Defense, Testing, Privacy and Compliance, and Governance and Management. For each, it provides a simple definition, notes comparable frameworks or models, and highlights the key differences that set them apart.

MITRE ATT&CK

Attack & Defense | Global, All industries
  • A detailed list of hacker tactics and techniques to understand how cyberattacks happen.
  • Similar to Cyber Kill Chain as both explain attack steps.
  • More detailed and regularly updated; focuses on real-world hacker behavior.

Cyber Kill Chain

Attack & Defense | Global, All industries
  • A model showing the stages of a cyberattack, from start to finish.
  • Like MITRE ATT&CK, it explains attacks step-by-step.
  • Simpler and more high-level, with fewer details than MITRE ATT&CK.

G7 FE-TLPT

Testing | Financial sector, mainly Europe
  • G7’s Financial Entities Threat-Led Penetration Testing. It is a specialized testing method to simulate cyberattacks on financial institutions.
  • Similar to CBEST, TIBER-EU, HKMA, and ICAST as they all focus on realistic attack simulations.
  • Specifically tailored for financial entities and EU requirements.

HKMA

Testing | Hong Kong
  • Hong Kong Monetary Authority Framework. Cyber testing and guidance for Hong Kong’s financial sector.
  • Similar to CBEST and TIBER-EU.
  • Tailored for Hong Kong’s banking rules and environment.

ICAST

Testing | Asia, especially Hong Kong
  • Intelligence-led Cyber Attack Simulation Testing. It tests how well banks and financial institutions handle targeted cyberattacks.
  • Similar to CBEST and TIBER-EU.
  • Built around Hong Kong’s regulations and local needs.

TIBER-EU

Testing | European Union
  • Threat Intelligence-based Ethical Red Teaming. EU-wide standard for realistic red team cyberattack simulations.
  • Same family as CBEST, ICAST, FE-TLPT.
  • Designed for EU-wide coordination and cross-border banking security.

AASE

Testing | Global
  • Adversarial Attack Simulation Exercise. General framework for running realistic cyberattack exercises.
  • Similar to TIBER-EU and CBEST.
  • Broader and not tied to a specific region or financial regulation.

CBEST

Testing | United Kingdom
  • Critical National Infrastructure Banking Supervision and Evaluation Testing. UK program for realistic attack simulations on financial institutions.
  • Similar to TIBER-EU, ICAST, FE-TLPT.
  • UK-specific with strong regulatory involvement.

PCI DSS

Privacy & Compliance | Global, especially companies handling card payments
  • Payment Card Industry Data Security Standard. Rules to protect credit card information.
  • Similar to ISO 27001 and GDPR in protecting sensitive data.
  • Very specific to credit card and payment systems.

GDPR

Privacy & Compliance | European Union and any company handling EU citizens’ data
  • General Data Protection Regulation. Protects personal data and privacy of individuals in the EU.
  • Similar to PCI DSS (data protection) and ISO 27001 (security).
  • Legal regulation with heavy fines for violations.

SOX

Privacy & Compliance | Mainly USA, publicly traded companies
  • Sarbanes-Oxley Act. Ensures companies are truthful about their financial reporting.
  • Related to FISMA in enforcing laws and accountability.
  • Focuses on preventing fraud in financial reporting, not just cybersecurity.

FISMA

Privacy & Compliance | United States, government agencies
  • Federal Information Security Management Act. U.S. law that sets security requirements for government systems.
  • Related to SOX and NIST CSF as they are all U.S. compliance frameworks.
  • Focuses only on government and federal data security.

HIPAA

Privacy & Compliance | USA, healthcare providers, insurers, related businesses
  • Health Insurance Portability and Accountability Act. Protects the privacy and security of healthcare and patient data.
  • Similar to GDPR (personal data) and PCI DSS (sensitive information protection).
  • Specifically focused on healthcare and medical records.

HITRUST CSF

Privacy & Compliance / Governance | Global, but mainly used in healthcare and highly regulated industries
  • Health Information Trust Alliance Common Security Framework. A framework that combines HIPAA, GDPR, ISO, NIST, and others into one common set of controls.
  • Acts like a bridge between HIPAA, ISO 27001, and NIST CSF.
  • Provides one unified framework instead of juggling multiple compliance rules.

CCPA

Privacy & Compliance | California, USA, and any company doing business with California residents
  • California Consumer Privacy Act. Gives California residents more control over their personal data, including rights to know, delete, and opt out of data sales.
  • Similar to GDPR and Data Privacy Act of the Philippines as all protect individuals’ data privacy.
  • Less strict than GDPR but one of the strongest U.S. state-level privacy laws.

DPA, RA 10173

Privacy & Compliance | Philippines, all companies and organizations handling personal information
  • Data Privacy Act of the Philippines. Protects the privacy and security of personal data of individuals in the Philippines.
  • Similar to GDPR (EU) and HIPAA (healthcare) as it focuses on data privacy and protection.
  • Philippine-specific law with local compliance requirements and the National Privacy Commission overseeing enforcement.

BSP 808

Privacy & Compliance / Financial Regulation | Philippines, banking and financial sector
  • Bangko Sentral ng Pilipinas Circular 808. Sets minimum cybersecurity standards for banks and financial institutions to protect customer accounts and prevent fraud.
  • Similar to CBEST, HKMA, and PCI DSS in protecting financial data.
  • Focused only on Philippine financial institutions and supervised entities.

NIST Cybersecurity Framework (CSF)

Governance & Management | Mainly USA but used worldwide
  • A flexible guide to help organizations manage and reduce cybersecurity risks.
  • Similar to ISO 27001 as both give security best practices.
  • NIST is more practical and step-by-step, while ISO is about certification and compliance.

ISO27001 or ISMS

Governance & Management | Global, All Industries
  • Information Security Management System. A global standard for managing and improving information security.
  • Similar to NIST CSF for security best practices.
  • ISO is international and focuses on management systems, not just technical security.

SOC-CMM

Governance & Management | Global, All Industries
  • Security Operations Center Capability Maturity Model. Measures how effective a security operations center is and how to improve it.
  • Similar to ISO 27001 for continuous improvement.
  • Specifically focused on improving security teams and operations.